咨询与建议

限定检索结果

文献类型

  • 18,316 篇 会议
  • 8,964 篇 期刊文献
  • 277 册 图书

馆藏范围

  • 27,557 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16,559 篇 工学
    • 11,886 篇 计算机科学与技术...
    • 9,760 篇 软件工程
    • 3,296 篇 信息与通信工程
    • 2,259 篇 控制科学与工程
    • 1,944 篇 电气工程
    • 1,876 篇 生物工程
    • 1,623 篇 电子科学与技术(可...
    • 1,480 篇 生物医学工程(可授...
    • 1,180 篇 光学工程
    • 1,085 篇 机械工程
    • 870 篇 化学工程与技术
    • 757 篇 仪器科学与技术
    • 740 篇 动力工程及工程热...
    • 701 篇 材料科学与工程(可...
    • 642 篇 安全科学与工程
    • 514 篇 建筑学
  • 8,470 篇 理学
    • 4,183 篇 数学
    • 2,361 篇 物理学
    • 2,213 篇 生物学
    • 1,279 篇 统计学(可授理学、...
    • 996 篇 化学
    • 954 篇 系统科学
  • 4,653 篇 管理学
    • 2,913 篇 管理科学与工程(可...
    • 1,929 篇 图书情报与档案管...
    • 1,472 篇 工商管理
  • 1,470 篇 医学
    • 1,244 篇 临床医学
    • 1,080 篇 基础医学(可授医学...
    • 658 篇 药学(可授医学、理...
  • 751 篇 法学
    • 599 篇 社会学
  • 639 篇 教育学
    • 605 篇 教育学
  • 509 篇 经济学
  • 318 篇 农学
  • 111 篇 文学
  • 67 篇 军事学
  • 40 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,267 篇 software enginee...
  • 1,154 篇 computer science
  • 487 篇 deep learning
  • 418 篇 computational mo...
  • 416 篇 application soft...
  • 394 篇 accuracy
  • 378 篇 machine learning
  • 364 篇 computer archite...
  • 355 篇 training
  • 345 篇 software
  • 322 篇 feature extracti...
  • 283 篇 internet of thin...
  • 278 篇 software systems
  • 262 篇 support vector m...
  • 258 篇 data mining
  • 231 篇 testing
  • 229 篇 programming
  • 215 篇 artificial intel...
  • 195 篇 semantics
  • 185 篇 optimization

机构

  • 358 篇 college of compu...
  • 199 篇 department of co...
  • 116 篇 department of co...
  • 113 篇 department of co...
  • 111 篇 school of softwa...
  • 103 篇 state key labora...
  • 91 篇 department of co...
  • 69 篇 department of co...
  • 66 篇 department of co...
  • 59 篇 department of co...
  • 58 篇 department of co...
  • 50 篇 department of co...
  • 46 篇 department of so...
  • 45 篇 department of co...
  • 44 篇 school of inform...
  • 41 篇 department of co...
  • 41 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 department of co...
  • 40 篇 renewable and su...

作者

  • 55 篇 rajkumar buyya
  • 44 篇 baowen xu
  • 43 篇 man ka lok
  • 37 篇 andrea alù
  • 36 篇 stuckey peter j.
  • 35 篇 niyato dusit
  • 30 篇 kono junichiro
  • 30 篇 shen furao
  • 28 篇 ivan i. smalyukh
  • 25 篇 muhammad waseem ...
  • 24 篇 wang lei
  • 24 篇 rehman attique u...
  • 24 篇 liu yang
  • 22 篇 khomh foutse
  • 22 篇 jiacun wang
  • 21 篇 qusay h. mahmoud
  • 21 篇 fattahi jaouhar
  • 20 篇 zhi-hui wang
  • 20 篇 dozier gerry
  • 20 篇 yingxu wang

语言

  • 23,902 篇 英文
  • 3,452 篇 其他
  • 223 篇 中文
  • 12 篇 德文
  • 11 篇 日文
  • 5 篇 土耳其文
  • 4 篇 法文
  • 4 篇 朝鲜文
  • 2 篇 葡萄牙文
  • 2 篇 俄文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
检索条件"机构=Software Engineering Program Department of Computer Engineering"
27557 条 记 录,以下是4751-4760 订阅
NCU-IISR/AS-GIS: Using BERTScore and Snippet Score to Improve the Performance of Pretrained Language Model in BioASQ 10b Phase B
NCU-IISR/AS-GIS: Using BERTScore and Snippet Score to Improv...
收藏 引用
2022 Conference and Labs of the Evaluation Forum, CLEF 2022
作者: Ting, Hao-Hsuan Zhang, Yu Han, Jen-Chieh Tsai, Richard Tzong-Han Interdisciplinary Program of Electrical Engineering and Computer Science National Central University Taiwan Department of Computer Science and Information Engineering National Central University Taiwan IoX Center National Taiwan University Taiwan Research Center for Humanities and Social Sciences Academia Sinica Taiwan
This paper presents our system for the BioASQ10b Phase B task. For ideal answers, we used the fine-tuned BioBERT model on the MNLI dataset to construct sentence embeddings and combined it with BERTScore to select sent... 详细信息
来源: 评论
Identifying Underrepresented Driving Scenarios in Training Datasets with SafeML Robustness Monitoring for Autonomous Driving Vehicles
Identifying Underrepresented Driving Scenarios in Training D...
收藏 引用
International Conference on System Reliability and Science (ICSRS)
作者: Bergler Matthias Tavakoli-Kolagari Ramin Lundqvist Kristina Department for Computer Science Nuremberg Institute of Technology Nuremberg Germany Dependable Software Engineering Mälardalens University Västerås Sweden
This study investigates the evaluation of the representativeness of datasets in autonomous driving systems using statistical distance metrics. Eight different datasets, created in the Carla simulation environment, cov... 详细信息
来源: 评论
Optimization of Microservices Security  3
Optimization of Microservices Security
收藏 引用
3rd International Conference on Advancements in Computing, ICAC 2021
作者: Kalubowila, D.C. Athukorala, S.M. Tharaka, B.A.S. Samarasekara, H.W.Y.R. Samaratunge Arachchilage, Udara Srimath S. Kasthurirathna, Dharshana Sri Lanka Institute of Information Technology Department of Computer Science and Software Engineering Malabe Sri Lanka
Microservices is a trending architecture, and due to its demanding features and behaviors, billions of business applications are developed based on it. Due to its remarkable ability to deploy and coordinate containeri... 详细信息
来源: 评论
Explainable-AI-based two-stage solution for WSN object localization using zero-touch mobile transceivers
收藏 引用
Science China(Information Sciences) 2024年 第7期67卷 27-45页
作者: Kai FANG Junxin CHEN Han ZHU Thippa Reddy GADEKALLU Xiaoping WU Wei WANG School of Mathematics and Computer Science Zhejiang A&F University School of Software Dalian University of Technology Faculty of Applied Sciences Macao Polytechnic University Department of Electrical and Computer Engineering Lebanese American University School of Information Engineering Huzhou University Guangdong-Hong Kong-Macao Joint Laboratory for Emotional Intelligence and Pervasive Computing Artificial Intelligence Research Institute Shenzhen MSU-BIT University
Artificial intelligence technology is widely used in the field of wireless sensor networks(WSN).Due to its inexplicability, the interference factors in the process of WSN object localization cannot be effectively elim... 详细信息
来源: 评论
Sales Optimization Solution for Fashion Retail  3
Sales Optimization Solution for Fashion Retail
收藏 引用
3rd International Conference on Advancements in Computing, ICAC 2021
作者: Ganhewa, N.B. Abeyratne, S.M.L.B. Chathurika, G.D.S. Lunugalage, Dilani De Silva, Dilshan Sri Lanka Institute of Information Technology Department of Software Engineering and Computer Science Kandy Sri Lanka
The Fashion industry is one of the extensive, changeable, and growing businesses to exist. It encompasses fashion retailing which functions as a mediator between the manufacturers and clients. On account of the incons... 详细信息
来源: 评论
Using Formal Knowledge to Support Episodic Evidence-Based Nursing Care
Using Formal Knowledge to Support Episodic Evidence-Based Nu...
收藏 引用
34th Medical Informatics Europe Conference, MIE 2024
作者: Jaffe, Shai Ben Shahar, Bruria Shahar, Yuval Goldstein, Ayelet Shalom, Erez Selivanova, Maya Rimon, Ephraim Cohen, Odeya Department of Nursing Faculty of Health Sciences Ben-Gurion University of the Negev Israel Nursing Informatics lab Faculty of Health Sciences Ben-Gurion University of the Negev Israel Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Israel Computer Science Department Hadassah Academic College Israel Herzfeld Geriatric Rehabilitation Medical Center Israel
Applying evidence-based medicine prevents medical errors highlighting the need for applying Clinical Guidelines (CGs) to improve patient care by nurses. However, nurses often face challenges in utilizing CGs due to pa... 详细信息
来源: 评论
Coordination of movement of multiagent robotic systems  16
Coordination of movement of multiagent robotic systems
收藏 引用
16th International Conference on Electronics computer and Computation, ICECCO 2021
作者: Kyzyrkanov, Abzal Atanov, Sabyrzhan Aljawarneh, Shadi L. N. Gumylyov Eurasian National University Computer and Software Engineering Nur-Sultan Kazakhstan Jordan University of Science and Technology Department of Software Engineering Irbid Jordan
Motion maintaining certain geometric patterns has a lot of benefits: system costs are reduced while improving efficiency and consistency and providing a flexible structure. This paper describes the behavioural approac... 详细信息
来源: 评论
Understanding Quantum software engineering Challenges An Empirical Study on Stack Exchange Forums and GitHub Issues
arXiv
收藏 引用
arXiv 2022年
作者: El aoun, Mohamed Raed Li, Heng Khomh, Foutse Openja, Moses Department of Computer Engineering and Software Engineering Polytechnique Montréal MontréalQC Canada
With the advance of quantum computing, quantum software becomes critical for exploring the full potential of quantum computing systems. Recently, quantum software engineering (QSE) becomes an emerging area attracting ... 详细信息
来源: 评论
Deep Convolutional Neural Network Approach for COVID-19 Detection
收藏 引用
computer Systems Science & engineering 2022年 第7期42卷 201-211页
作者: Yu Xue Bernard-Marie Onzo Romany F.Mansour Shoubao Su School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Engineering Research Center of Digital Forensics Ministry of EducationNanjing University of Information Science and TechnologyNanjingChina Department of Mathematics Faculty of ScienceNew Valley UniversityEl-Kharja72511Egypt Jiangsu Key Laboratory of Data Science and Smart Software Jinling Institute of TechnologyNanjing211169China
Coronavirus disease 2019(Covid-19)is a life-threatening infectious disease caused by a newly discovered strain of the *** by the end of 2020,Covid-19 is still not fully understood,but like other similar viruses,the ma... 详细信息
来源: 评论
Trust-aware Cloudlet Federation Model for Secure Service Selection
Trust-aware Cloudlet Federation Model for Secure Service Sel...
收藏 引用
Energy, Power, Environment, Control, and Computing (ICEPECC), International Conference on
作者: Vaneeza Shahid Muhammad Ziad Nayyer Usama Ahmed Department of Computer Science GIFT University Gujranwala Pakistan Department of Software Engineering Government College University Faisalabad Faisalabad Pakistan
The introduction of Edge computing has pushed the horizon to the edge of the network and the user’s proximity. The openness of data on the edge raised many issues about the security of data. Although edge computing i...
来源: 评论